Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 18:07

General

  • Target

    c68950af21850332072cb4c6bdc6c21b.exe

  • Size

    784KB

  • MD5

    c68950af21850332072cb4c6bdc6c21b

  • SHA1

    5483f5cf907aef3aca9612949f81dfbf2c45b39d

  • SHA256

    16d78c29bf6a505b18489e3654178b27d3d60e9885bc345c18d16117ef75fb84

  • SHA512

    937d48155afd2f98c822cdf09aa493833df91411276b1d110f1c85cdbe9a43eb415165e0cc81d7f2762d9aeb38f36d5c0a6fc142bfd1761fcdad0356c94a9636

  • SSDEEP

    12288:0Zq6vFJaL3kSj2Onuel/Q1SdyaI+Os1wo6R5xsyAonaVgc+oqzr888888888888D:0dtsU76uel/Q1my3oySfVgl7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68950af21850332072cb4c6bdc6c21b.exe
    "C:\Users\Admin\AppData\Local\Temp\c68950af21850332072cb4c6bdc6c21b.exe"
    1⤵
      PID:2072

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2072-0-0x0000000000400000-0x00000000005DE000-memory.dmp

            Filesize

            1.9MB

          • memory/2072-1-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/2072-2-0x0000000000400000-0x00000000005DE000-memory.dmp

            Filesize

            1.9MB

          • memory/2072-4-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB